Search This Blog

BlockDoS is a DDos protection service that offers top-tier global DDoS mitigation options that protect internet operations from the debilitating service disruptions caused by DDoS attacks. BlockDoS is the ﬁrst choice for DDos protection of some of the biggest data centers worldwide due to its unmatched quality and service features.

THE TINY FLASH ON YOUR SMART PHONE COULD BE ALARMING!

How could a tiny flash application on your smart phone be sending your highly confidential data back to its developers? And how your information gets passed on to the advertising agencies and marketing research firms and other third parties? How? You must be asking. Let us enlighten you.

Many flashlight apps which allow a device to be used as a torch also secretly record the most sensitive personal information. This may include the location of the phone, details of its owner and their contacts, and even the content of text messages.

The truth is, your smart phone is really spying on you with the applications you download every day – without your knowledge and without your consent. Privacy policy is an important feature that must be present with every application developed. But Google and Apple don’t require applications to have written privacy policies.

As advertising on applications becomes more popular, online tracking companies are suddenly very, very interested to see what we are downloading, how long and how frequently we use that download, who we are, whether we are male or female, where we live — you get the picture.

A recent article in the Wall Street Journal tested 101 popular applications for both iPhone and Android. Out of the 101 tested, here are the highlights of what they found:

Number of those apps that transmitted the phone’s unique ID number to other companies without consent: 65

Number of apps that transmitted the phone’s location: 47

Number of those who sent age, gender, and other personal information to online tracking companies: 5

Here’s a breakdown of the most frequently collected data:

82 percent of the top Android free apps and 49 percent of the top Android paid apps track user location

50 percent of the top iOS free apps and 24 percent of the top iOS paid apps track user location

According to Appthority, “One of the main reasons app developers initiate app tracking is to generate supplementary revenue by sharing app user data with advertising networks and analytic companies. In some cases, particularly with free apps, developers are paid based on the amount of data they collect and share about users.”

All this revealing information is pretty scary. Even scarier when you know that there’s actually NOTHING you can do about it. When it comes down to your PC, you can easily delete the cookies found in your computer system and rest assured but with smart phones you cannot do it, at least not at this point in time.

Keep checking our space as we stay on the lookout for more information about how you can make your privacy more private. Stay safe, and secure.

Popular posts from this blog

Any company with an online network, website or server is subject to hacking or other malicious attacks. These web attacks can jeopardize confidential personal and financial data and can also cripple a company’s online presence. The end result usually involves a company’s loss of money, time and/or credibility. Fortunately, these losses and disruptions can be avoided if the right safety precautions are implemented. Every company should prioritize online security and its management should be left in the capable hands of specialists.

Located in Mississauga, Ontario, BLOCKDOS is one of the Leading Canadian Security company that offer comprehensive online security services. BLOCKDOS not only mitigates any attacks on a company’s network, but also takes the necessary measures to prevent such attacks from happening in the first place. Through BLOCKDOS, a company can be confident that their entire network is securely hosted and set up to only allow appropriate traffic to come through. BLOCKDO…

Picture Source : Google Images The ultimate goal of a DDoS attack is to bring down the targeted site by flooding it with fake requests, usually from multiple locations.

Thousands of DDoS attacks take place every day and typically these attacks last for a number of days.

But not all of these attacks take days before they die down. There are also short duration DDoS attacks that only take a few minutes. These short duration attacks have the same modus operandi where attackers coordinate and launch the attack full throttle.

These short duration DDoS attacks are becoming more and more talked about and are happening more often as their frequency has increased in comparison to full blown DDoS attacks that last way longer.

An early trend that has been spotted with these short bursts of DDoS attacks is that apparently they’re carried out primarily to divert site owner’s attention.

In this article, we would like to address what happens when this type of attack targets a site and possible protection…

As a gamer would progress to the new level in a game he meets a new more powerful nemesis who’s ready to make our player’s virtual life more and more troublesome and makes it harder for him to progress further in the game. Well, for the gamers of our age, their nemesis is back and this time round it’s armed to the teeth with new weaponry under its sleeve that makes it even the more powerful and harder to defeat. It’s DDoS aiming at gamers.

Anyone receiving a new Xbox One or PlayStation 4 on Christmas morning was likely in for a frustrating first experience with the system, as the PlayStation Network and Xbox Live were both taken down by prolonged distributed denial of service (DDOS) attacks.

In addition to that, an 18-year-old UK man has been arrested as part of an investigation into the recent DDOS attacks that crippled PlayStation and Xbox services over Christmas.

Nowadays gaming is not just limited to recreation and entertainment at home for kids and teenagers and more serious adult g…